Browsing by Title

Sort by: Order: Results:

  • Myint, Thida; Htoon, Ei Chaw; Maw, Aung Htein (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Digitization and networked computing in the healthcare sector have resulted in electronic patient records that are stored, managed and shared among different healthcare providers. Replication process enables the data ...
  • San, Myo Myo (University of Computer Studies, Yangon, 2022-06)
    Caching is a simple and effective way to provide faster access to information on the Internet, and it has been used effectively to improve the E- commerce servers. However, there is a growing concern by today’s Web ...
  • Htwe, Lei Yi; Phyu, Aye Lei Lei (Sixth Local Conference on Parallel and Soft Computing, 2011-12-29)
    Clustering refers to the grouping of data records, observation or cases into similar objects. A cluster observation or cases similar to one another, and dissimilar to the record in other cluster. Recently, much research ...
  • Myint, Kaung Htet (University of Computer Studies, Yangon, 2019-01)
    Short Message Service (SMS) is a text messaging service component of mobile communication systems. It uses standardized communications protocols to exchange short text between mobile devices. SMS does not have any ...
  • Aung, Tun Myat; Myint, Kaung Htet; Hla, Ni Ni (Advances in Intelligent Systems and Computing (ICO 2018), 2018-09-28)
    Short Message Service (SMS) is a text messaging service component of mobile communication systems. It uses standardized communications protocols to exchange short text between mobile devices. SMS does not have any built-in ...
  • Khaing, Kyawt Kay; Myint, Mu Mu (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    In the database management systems, concurrency control is an important problem for the simultaneous execution of transaction over a shared database can create several data integrity and consistency problem. In order ...
  • Lwin, Thuzar; Khaing, Myo Kay (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    The client/server method of network communications is the most popular one. Its ease of implementation and scalability make it a good choice in many different kinds of networking environments.A client transaction becomes ...
  • Win, Phyoe Su Su; Mon, Thet Su (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    The general elements of transaction processing are data capture and validation, transaction-dependent processing steps and database maintenance. Database Management Systems (DBMS) are among the most complicated applications. ...
  • Kyi, Khin Myat; Nyunt, Thi Thi Soe (Eighth Local Conference on Parallel and Soft Computing, 2017-12-27)
    XML and relational databases are two of the most important mechanisms for storing and transferring data. A reliable and flexible way of moving data between them is very desirable goal. This paper includes comparison ...
  • Aye, Thae Nu (University of Computer Studies, Yangon, 2023-01)
    There is a vast amount of duplicated or redundant data in storage systems. The existing data deduplication attempted to reduce the storage spaces in file-level, sub file-level data storage in terms of byte-level. There ...
  • Thwel, Tin Thein; Thein, Ni Lar (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    As the amount of storage utilization become larger and larger, people have been tried to find out the efficient ways to safe storage space. The single instance storage or data deduplication becomes vague in storage ...
  • Hlaing, Htike Ayar; Aye, Soe Soe (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    In the current computing community, secure data transfer is limited due to its attack made on data communication. Solutions which came to the rescue are cryptography and steganography. Cryptography is often used in ...
  • Win, Ngu War; Aye, Soe Soe (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    In this age of universal electronic connectivity is needed to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. The disciplines ...
  • Lwin, Yupar Kyaw; Thida, Aye (Fourth Local Conference on Parallel and Soft Computing, 2009-12-30)
    A data warehouse uses multiple materialized views to efficiently process a given set of queries. Materialized views selection is one of the crucial decisions in designing a data warehouse for optimal efficiency. The idea ...
  • Khin, KayKay Thi Wut Hmone; Oo, Lwin Lwin (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Today, people use widely computer networks to communicate from one place to another. When people use computers, they will need necessary to protect the information and to thwart the hackers. So, people interconnect their ...
  • Aung, Pyae Thanda; Mya, Khin Than (Third Local Conference on Parallel and Soft Computing, 2009-08-03)
    Steganography is the art of hiding the fact that communication is taking place, b hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because ...
  • Thant, Phyo Thandar; Naing, Thinn Thu (Twelfth International Conference On Computer Applications (ICCA 2014), 2014-02-17)
    Cloud Computing is one of the converging technology trends in Information Technology which can pave the way to optimized computing solution. Several research issues exist in these converging technologies. Among them, ...
  • Win, Swe Zin (Fifth Local Conference on Parallel and Soft Computing, 2010-12-16)
    Today, many business applications continue the ongoing creation of separated data stores; data mining often requires data integration for those data. This process becomes significant in a variety of situations both ...
  • San, Kyawt Kyawt; Tun, Khin Nwe Ni (Ninth International Conference On Computer Applications (ICCA 2011), 2011-05-05)
    The RDF (Resource Description Framework) model has attracted the attention of the database community and many researchers have proposed different solutions to store and query RDF data efficiently. This paper proposes ...
  • Baral, Amit Raj; Koshiba, Takeshi (Thirteenth International Conferences on Computer Applications(ICCA 2015), 2015-02-05)
    Increasing dependency of data availability and the fear of losing the private information during com- munication motivate the need of privacy protection. One of the common problems occurs when two par- ties need to ...

Search Repository

Browse

My Account